Author:
Rivest Ronald L.,Sherman Alan T.
Reference30 articles.
1. Asmuth, C. A., and G. R. Blakley. An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems. Comp. & Maths. with Appls, 7 (1981), 447–450.
2. Avis, G. M., and S. E. Tavares. A microprocessor based cryptosystem for secure message exchange. Advances in Cryptology: Proceedings of CR YPTO
82, Plenum Press, ( New York, 1983 ).
3. Berlekamp, E. R., R. J. McEliece, and H. van Tilborg. On the inherent intractability of certain coding problems. IEEE Trans. on Info. Theory, IT-24 (1978), 384–386.
4. Blakley, G. R. The Vernam one-time pad is a key safeguarding scheme, not a cryptosystem. Proceedings of the 1980 IEEE Symposium on Security and Privacy, (1980), 447–450.
5. Blum, Manuel, and Silvio Micali. How to generate cryptographically strong sequences of pseudo random bits. Proceedings of the 23
rd
Annual Symposium on Foundations of Computer Science, (November, 1982 ), 112–117.
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Exploring Horizontal Scaling Solutions to Enhance CryptDB Performance under High Concurrency on AWS;2023 IEEE XXX International Conference on Electronics, Electrical Engineering and Computing (INTERCON);2023-11-02
2. Characterizing a Time–Memory Tradeoff Against PudgyTurtle;SN Computer Science;2023-06-27
3. A Randomized Dot Pattern Character Encoding Scheme (R-DPCES) for Steganography;2022 International Conference on Automation, Computing and Renewable Systems (ICACRS);2022-12-13
4. A chaos-based probabilistic block cipher for image encryption;Journal of King Saud University - Computer and Information Sciences;2022-01
5. Selected Design and Analysis Techniques for Contemporary Symmetric Encryption;Security of Ubiquitous Computing Systems;2021